Bug 1472254 - [downstream clone - 4.1.6] [RFE] - AD domain configuration is not supported in ovirt-engine-extension-aaa-ldap-setup, provide examples how to configure AD domain
Summary: [downstream clone - 4.1.6] [RFE] - AD domain configuration is not supported i...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine-extension-aaa-ldap
Version: 4.1.0
Hardware: Unspecified
OS: Unspecified
urgent
high
Target Milestone: ovirt-4.1.6
: ---
Assignee: Ondra Machacek
QA Contact: Gonza
URL:
Whiteboard:
Depends On: 1462294
Blocks: 1464498
TreeView+ depends on / blocked
 
Reported: 2017-07-18 10:10 UTC by rhev-integ
Modified: 2020-07-16 09:55 UTC (History)
10 users (show)

Fixed In Version: ovirt-engine-extension-aaa-ldap-1.3.4
Doc Type: Enhancement
Doc Text:
When configuring Active Directory (AD) with the ovirt-engine-extension-aaa-ldap-setup tool, regardless of whether you are defining a multiple or single domain forest, you can only configure the name of the forest - you cannot define the name of a specific domain or a specific server. This release provides examples for common advanced AD configuration which users can copy to their local environment and adapt as required. These examples are bundled within the ovirt-engine-extension-aaa-ldap package and after installing the package, a description of these examples can be found in /usr/share/ovirt-engine-extension-aaa-ldap/examples/README.md In addition, the following improvements have been made to the ovirt-engine-extension-aaa-ldap-setup tool: 1. A more detailed error reporting for various AD forest configuration steps. 2. A mandatory login test that checks the configuration (previously this test was optional).
Clone Of: 1462294
Environment:
Last Closed: 2017-09-19 07:16:21 UTC
oVirt Team: Infra
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2017:2743 0 normal SHIPPED_LIVE ovirt-engine-extension-aaa-ldap bug fix and enhancement update for RHV 4.1.6 2017-09-19 11:11:44 UTC
oVirt gerrit 80049 0 None None None 2017-08-03 12:48:10 UTC
oVirt gerrit 80078 0 None None None 2017-08-03 12:48:31 UTC
oVirt gerrit 80088 0 None None None 2017-08-03 12:48:48 UTC

Description rhev-integ 2017-07-18 10:10:58 UTC
+++ This bug is a downstream clone. The original bug is: +++
+++   bug 1462294 +++
======================================================================

Description of problem:

At present, the setup script prompts the user to enter the forest name for AD configuration.

If the user does not want to use the Forest name and wants just the domain name, there is no such option at present for the user.

Seems like Forest name is made mandatory for AD setup.

Also, if the user enters a wrong Forest name, the script exits with an error and does not offer a chance to specify the domain name instead.

Need the script to provide the flexibility to use either one by the user.

Thanks,
Anitha

(Originally by Anitha Udgiri)

Comment 2 rhev-integ 2017-07-18 10:11:08 UTC
Notes:
1. ovirt-engine-extension-aaa-ldap-setup tool is created to help with default and/or simple LDAP configurations. Unfortunately configuring AD domain is not default nor simple unlike forrest. To configure forrest every information about LDAP servers can be found in DNS, but to configure domain user needs to know which server(s) to use, type of destination server selection algorithme in case of multiple servers, type of protocol to connect to destination server(s)

2. If user knows required information about AD domain, he can configure it manually without the tool

Solution:
We will provide AD domain configuration within setup tool using set of questions:

1. Do you want to configured AD domain or forrest?
2. If forrest selected, use the same automatic method as currently provided
3. If domain select continue.
4. Which type of servers set do you want to use (single server, failober, round robin)?
5. Which LDAP servers do you want to use (space separated list of FQDNs or IPs)
6. Which protocol do you want to use to connect to above servers (plain, SSL, StartTLS)
7. Which port should be used for connection to above servers?
8. Continue with with authentication questions (same as for forrest)

(Originally by Martin Perina)

Comment 3 Martin Perina 2017-08-03 12:31:49 UTC
Inside ovirt-engine-extension-aaa-ldap-setup tool it's possible to configure AD Forrest with multi-domain trust or AD Forrest with single domain (aka single domain), but it's not possible to configure using only a single domain from multi-domain AD forest. This is advanced configuration which is very hard to achieve to be performed automatically (unlike configuring AD forest which is quite easy for automatic configuration).

So we will provide examples for common advanced AD configuration which users can copy and adapt to their local environment

Comment 4 Martin Perina 2017-08-03 12:45:44 UTC
To improve ovirt-engine-extension-aaa-ldap-setup tool user experience will also do following changes:

1. Add more detailed error reporting for verious AD forest configuration steps
2. Make Login test mandatory to test provided configuration (until now invoking Login or Search tests was optional and most users just skipped those tests and they were surprised later)

Comment 5 Martin Perina 2017-08-08 08:05:13 UTC
Fix is included in ovirt-engine-extension-aaa-ldap-1.3.3

Comment 7 Gonza 2017-08-18 13:11:59 UTC
Verified with:
ovirt-engine-extension-aaa-ldap-setup-1.3.4-0.0.master.git2db902e.el7.centos.noarch

Comment 8 Martin Perina 2017-08-18 15:04:07 UTC
Retargeting to 4.1.6, as we need to withdraw release of ovirt-engine-extension-aaa-ldap-1.3.3 due to critical bug contained in it

Comment 9 Martin Perina 2017-08-28 10:41:30 UTC
Fix is included in ovirt-engine-extension-aaa-ldap-1.3.4

Comment 11 Gonza 2017-09-04 11:54:19 UTC
Verified with:
ovirt-engine-extension-aaa-ldap-setup-1.3.5-0.0.master.git7230cd9.el7.centos.noarch

Comment 13 errata-xmlrpc 2017-09-19 07:16:21 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:2743


Note You need to log in before you can comment on or make changes to this bug.